General

  • Target

    fbcaa6e3ac52156f8e5e1f3f705c04de50154b2a9f07cef94a32725e1bb307ff

  • Size

    352KB

  • Sample

    221123-m4xnwsfg72

  • MD5

    cbd17d27e82f5a6d605c54b0e09ae3a2

  • SHA1

    0b9aaca97ef22b48f50af09415fd88b91e45dcc1

  • SHA256

    fbcaa6e3ac52156f8e5e1f3f705c04de50154b2a9f07cef94a32725e1bb307ff

  • SHA512

    2fc3803a8f8cec17c6bffb116e7afa13c33abdf455bf0d544de20515d03dd69d3f825604b6fac051ff1d7f279986dcf7ced33b7b5186481844799967766f8c73

  • SSDEEP

    6144:oNvTOod870Aa5Xh289/xhYzVr6hTKNovhQphgdqnit2Mk9LUCXy7e+RF8ERf1VRP:mbuvaxhjIJ6h2Yhag0nisJUSm1VRP

Malware Config

Targets

    • Target

      fbcaa6e3ac52156f8e5e1f3f705c04de50154b2a9f07cef94a32725e1bb307ff

    • Size

      352KB

    • MD5

      cbd17d27e82f5a6d605c54b0e09ae3a2

    • SHA1

      0b9aaca97ef22b48f50af09415fd88b91e45dcc1

    • SHA256

      fbcaa6e3ac52156f8e5e1f3f705c04de50154b2a9f07cef94a32725e1bb307ff

    • SHA512

      2fc3803a8f8cec17c6bffb116e7afa13c33abdf455bf0d544de20515d03dd69d3f825604b6fac051ff1d7f279986dcf7ced33b7b5186481844799967766f8c73

    • SSDEEP

      6144:oNvTOod870Aa5Xh289/xhYzVr6hTKNovhQphgdqnit2Mk9LUCXy7e+RF8ERf1VRP:mbuvaxhjIJ6h2Yhag0nisJUSm1VRP

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks